vendor:
FNIP-8x16A/FNIP-4xSH
by:
iej1ctk1g
5.5
CVSS
MEDIUM
Cross-Site Request Forgery
352
CWE
Product Name: FNIP-8x16A/FNIP-4xSH
Affected Version From: 1.0.20
Affected Version To: 1.0.11
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Linux
2020
P5 FNIP-8x16A FNIP-4xSH 1.0.20 – Cross-Site Request Forgery (Add Admin)
The P5 FNIP-8x16A/FNIP-4xSH controller suffers from CSRF and XSS vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several GET/POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
Mitigation:
Implement proper input validation and sanitization to prevent CSRF and XSS attacks. Regularly update the software to the latest version to address any security vulnerabilities.